General
-
Target
f476ebfaeaa27f3016fb6357110ee3f9_JaffaCakes118
-
Size
8.3MB
-
Sample
240416-2brz9sfg6y
-
MD5
f476ebfaeaa27f3016fb6357110ee3f9
-
SHA1
e9e5b0e7f2cb3ad868e7daca20199a2cfa3de1ef
-
SHA256
a96a2a11cbe0bab14ef1c21f53ed05bded4862f92e6c366e9a12996a91c8cec8
-
SHA512
7ba75c49a5a936c8ee33a11cc5cb8e5565a337c3a9f73c4cc2fcad1ab983f53d2c63edc8db357d4606f727e9e78a43b65c1e31a65e5a2f08b5710bd9642b35db
-
SSDEEP
196608:mOuWLcN3jUQKWu+kr5uvAJveYJnUiXafqUmXafqUpt:buWLUUTWu+Zv6vtnUigDmgDpt
Static task
static1
Behavioral task
behavioral1
Sample
f476ebfaeaa27f3016fb6357110ee3f9_JaffaCakes118.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
f476ebfaeaa27f3016fb6357110ee3f9_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240229-en
Behavioral task
behavioral3
Sample
alipay_plugin510.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral4
Sample
alipay_plugin510.apk
Resource
android-33-x64-arm64-20240229-en
Malware Config
Targets
-
-
Target
f476ebfaeaa27f3016fb6357110ee3f9_JaffaCakes118
-
Size
8.3MB
-
MD5
f476ebfaeaa27f3016fb6357110ee3f9
-
SHA1
e9e5b0e7f2cb3ad868e7daca20199a2cfa3de1ef
-
SHA256
a96a2a11cbe0bab14ef1c21f53ed05bded4862f92e6c366e9a12996a91c8cec8
-
SHA512
7ba75c49a5a936c8ee33a11cc5cb8e5565a337c3a9f73c4cc2fcad1ab983f53d2c63edc8db357d4606f727e9e78a43b65c1e31a65e5a2f08b5710bd9642b35db
-
SSDEEP
196608:mOuWLcN3jUQKWu+kr5uvAJveYJnUiXafqUmXafqUpt:buWLUUTWu+Zv6vtnUigDmgDpt
Score7/10-
Queries information about the current Wi-Fi connection.
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
-
-
Target
alipay_plugin510.apk
-
Size
748KB
-
MD5
d06ea38e4210a87d6b96f8b0491df677
-
SHA1
3ba573396398757088e559a9d372049a377eb05a
-
SHA256
76a24f83ad15586ff9a2081e420a707be9ddb0b5047e5b6de5974c41624ff2c1
-
SHA512
3d43e5bfad2b703a804a53048b6a88228a11fb80ac641d6594f774cc07f6c7367e0ee80b29966d02c9206542f467f55b0f1ddbbfef0ec372256314a7d1071f30
-
SSDEEP
12288:IjRAsoln+WMB1EgrGERh4xWgtSM7vXrRCn4I5p2Cnfv:IjRApZ+WM7yER61P7jw4IGSfv
Score1/10 -